1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ale4655 [162]
3 years ago
7

Suppose 8 people want to communicate with each other using public key encryption. The communication between any pair of them is

visible to all of them but no other person other than the pair should be able to decode their communication. How many public and private keys are required for this group?
Computers and Technology
1 answer:
ludmilkaskok [199]3 years ago
5 0

Answer:

The answer is "64"

Explanation:

There has been 1 Private Key 1 Public Key for every person. The private key is used for other app messages. All else uses the Public Key to encrypt messages with that user. Those keys are numerically related. Even if you have 5 users, you will be given 5 Personal keys and 5 Public keys.

  • All user will have a duplicate of other public keys, which indicates (n*n-1) copies of n public keys on different systems to make sure shared contact between all users, plus n private keys.
  • The unique key count is 2n, with n^2 distributed private and public keys on different systems.
  • 8 people,  where 8 is a number, that is equal to n so, n^2 = 8^2 =8 \times 8 = 64
You might be interested in
To delete data from a disk in such a way that no one can ever read it, you should ____.
Vlada [557]
Factory reset or install a new OS without keeping the data.
5 0
3 years ago
In C++ the declaration of floating point variables starts with the type name double, followed by the name of the variable, and t
Vadim26 [7]

Answer:

See explaination

Explanation:

Given a partial grammar which represents the specification for C++ style variable declaration. In this range a - z indicates terminals that represents the variable names.

'S' is the start symbol of the

non-terminal.

Hence, given,

S= TV

V= CX

Please kindly refer to attachment for further instructions and complete step by step solution.

8 0
3 years ago
In a remote control,infrared light( )to control TV<br>a.are used b.is used c.was used​
schepotkina [342]
B. Is used
If this is not the full statement it may be C
6 0
3 years ago
Personal information in the computer can be viewed and stolen
agasfer [191]
If that’s a true or false question it’s true.
6 0
2 years ago
A TCP connection has reached a steady state and transmits data at a constant rate. List as many factors as you can that determin
Vaselesa [24]

<u>TCP connection:</u>

Once TCP connections reached steady state that makes end user that connectivity is stable. But end user has to do analysis the pinging time ready. for example in operating system command prompt mode ends user have  to ping designation tcpip address.

<u>Computer A</u>

In command prompt mode end user try ping 10.10.10.10 –t (i.e. Computer B tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

Same away

<u>Computer B</u>

In command prompt mode end user try ping 10.10.10.20 –t (i.e. Computer A tcpip Address). End user tries to ping destination tcpip address if result comes in milliseconds then it is good connectivity rate.

End user can also check by executing TRACERT commands on designation tcpip address.  End user can find how the flow of network packets travels.

8 0
3 years ago
Other questions:
  • ll of the following are extra precautions you can take to secure a wireless network EXCEPT ________. Select one: A. turn on secu
    9·1 answer
  • When was microsoft word for windows invented?
    13·1 answer
  • Do the pros of interpersonal communication via social media outweigh the cons? Explain.
    9·2 answers
  • Which of the following statements is/are true? (Points : 5) A. A default constructor is automatically created for you if you do
    12·1 answer
  • When the location of a data source is defined as a(n) _______ location, excel will access the connection to the data source with
    15·1 answer
  • A(n) _____ is a computer program that can damage files and programs on your computer.
    6·2 answers
  • For every $1 of deposits, the banks can increase ________________ by the value of the Money Multiplier.
    15·1 answer
  • Which of the following would an NSA professional most likely need?
    5·2 answers
  • You develop an app, and you don’t want anyone to resell it or modify it. This is an example of: A
    5·1 answer
  • What is the difference between spyware and adware?
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!